iWorld
ZEE5’s State of Siege: Temple Attack narrates the heroic tale of NSG commandos
New Delhi: Over a year after ZEE5 streamed its web series based on the 26/11 terrorist attack, the OTT platform has come up with the second edition of its State of Siege series. This time, the platform has narrated the heroic tale of the NSG Commandos, who led the counter-insurgency operation at Akshardham Temple in Gujarat in September 2002. The State of Siege- Temple Attack is streaming on ZEE5.
The film’s producer Abhimanyu Singh and director Ken Ghosh, and ZEE5, head, Hindi Originals Nimisha Pandey got into a freewheeling conversation with Indiantelevision.com Group, founder, CEO, and editor-in-chief Anil Wanvari to talk about the making of the film. They were joined by film’s cast Gautam Rode and Vivek Dahiya along with Lt Col Sundeep Sen who worked as a consultant (military veteran) on the film. The virtual roundtable – ‘The making of the State of Siege: Temple Attack’ was presented by Contiloe Pictures.
The film comes a year after the OTT platform launched State of Siege: 26/11, which was based on Sandip Unnithan’s book Black Tornado: The Three Sieges of Mumbai 26/11. Unlike the first edition which was released in eight episodes, this time ZEE5 has launched the State of Siege as a digital film.
“We launched the first web series in March 2020, just when the lockdown began and it remains one of the most-watched series on the platform,” said ZEE5, head, Hindi Originals Nimisha Pandey, “OTT has given us huge freedom, as we are no longer tied up with formats. In today’s time, stories decide which format they should be going into. In the case of Temple Attack, we decided to make a feature film because the story couldn’t have been stretched up to six-seven episodes.”
Elaborating on the audience response, Pandey said the interest for the film has spiked since its launch on 9 July and performed reasonably well over the last weekend. “We had launched it in Hindi and dubbed it in Tamil and Telugu, and it is good to know that the film is doing well pan-India across all three languages,” said Pandey.
“It was a story worth telling,” said producer Abhimanyu Singh, who initially conceptualised the film. “After reading into the subject and doing our research, we thought that nothing has been told from the commandos’ point of view. The more we delved into it, the more we realised how fantastic this story was.”
The film was shot across different states including Himachal Pradesh, amid the challenges thrown by the pandemic. However, the most daunting part of the job was the post-production process, which had to be done remotely, said director Ken Ghosh. “It was challenging to do the post-production during the pandemic, and we had to coordinate on virtual calls. But we managed to pull it off. We have done a lot of research and brought in symbolism in certain scenes. We also tried to ensure that the action looks very real,” said Ghosh.
Son of a Naval officer, Ghosh said he drew experiences from his childhood and was elated to take up the project. “I have always wanted to do a war-based movie,” he added.
The film marks Bollywood actor Akshaye Khanna’s debut on the OTT. It also stars Abhimanyu Singh, Gautam Rode, Vivek Dahiya, Akshay Oberoi, Parvin Dabas, Samir Soni, Mir Sarwar, and Manjari Fadnis.
“It was challenging initially, but we went with the director’s vision and Col Sen’s guidance throughout helped in getting the action scenes right,” said actor Gautam Rode, who plays Major Samar in the movie. “We have managed to keep it real, and tried to avoid any over-dramatization.”
Vivek Dahiya who was also part of the SOS: 26/11, said, people were eager to know more about the Akshardham attack, which generated interest for the film. Dahiya plays an NSG commando who is new to the team but is sent to rescue hostages who are being held by terrorists at the temple. “I am glad I got the opportunity to be part of this role. The whole experience has wholly transformed me,” he said.
Lt Colonel Sundeep Sen said he tried to ensure that nothing that’s shown in the movie comes across as derogatory to the Armed forces. “Very few people dare to tell such stories. There has to be sincerity in the effort, and I found that in the team,” he said.
The film is currently streaming on ZEE5.
iWorld
Meta warns 200 users after fake Whatsapp spyware attack
Italy-targeted campaign used unofficial app to deploy surveillance spyware.
MUMBAI: It looked like a message, but it behaved like a mole. Meta has warned around 200 users most of them in Italy after uncovering a targeted spyware campaign that weaponised a fake version of WhatsApp to infiltrate devices. The attack, first reported by Agenzia Nazionale Stampa Associata, relied on classic social engineering with a modern twist: persuading users to download an unofficial WhatsApp clone embedded with surveillance software. The malicious application, believed to be developed by Italian firm SIO through its subsidiary ASIGINT, was designed to mimic the real app closely enough to bypass suspicion.
Meta’s security teams identified roughly 200 individuals who may have installed the compromised version, triggering immediate countermeasures. Affected users were logged out of their accounts and issued alerts warning of potential privacy breaches, with the company describing the incident as a “targeted social engineering attempt” aimed at gaining device-level access.
The malicious app was not distributed via official app stores but circulated through third-party channels, where it was presented as a legitimate WhatsApp alternative. Once installed, it reportedly allowed external operators to access sensitive data stored on the device turning a simple download into a potential surveillance gateway.
According to Techcrunch, Meta is now preparing legal action against the spyware developers to curb further misuse. The company, however, has not disclosed details about the specific individuals targeted or the extent of data compromised.
A Whatsapp spokesperson reiterated that user safety remains the top priority, particularly for those misled into installing the fake iOS application. Meanwhile, reports from La Repubblica suggest the spyware may be linked to “Spyrtacus”, a strain previously associated with Android-based attacks that could intercept calls, activate microphones and even access cameras.
The episode underscores a growing reality in the digital age, the threat is no longer just what you download, but where you download it from. As unofficial apps become increasingly convincing, the line between communication tool and covert surveillance is getting harder to spot and far easier to exploit.






